We performed a comparison between CyberArk Privileged Access Manager and RSA Identity Governance and Lifecycle based on real PeerSpot user reviews.
Find out what your peers are saying about CyberArk, Delinea, BeyondTrust and others in Privileged Access Management (PAM)."The Password Upload Utility tool makes it easier when setting up a Safe that contains multiple accounts and has cut down the amount of time that it takes to complete the task."
"The password vault and session monitoring are useful."
"The central password manager is the most valuable feature because the password is constantly changing. If an outsider threat came in and gained access to one of those passwords, they would not have access for long."
"Provides improved security around having your credentials locked down and rotated regularly."
"We like it for the ability to automatically change passwords. At least for my group, that's the best thing."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"Central Password Manager is useful for agentless automated password management through AD integration as well as endpoints for different devices."
"The biggest feature is the security of the overall solution. It's very secure. The vaulting technology and the number of security layers involved in the vault, where privileged accounts are actually stored, is the heart of the solution."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"The most valuable feature is the security, in particular, the One Time Password support."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"I would like to see improvement in the custom connector for integration with different devices."
"Sometimes the infrastructure team is hesitant to provide more resources."
"The current interface doesn't scale that well, and has some screens still in the old layout."
"They need to provide better training for the System Integrator."
"I'm not a fan of technical support with CyberArk. It's like jumping through red tape and hoops. Quite frankly, it's almost like when you call CyberArk you get the Help Desk or the level-one. I'm a level-one. I got the CCD, I know how to do the initial troubleshooting. When I call CyberArk it's because I can't figure the problem out. So I need a level-two, three, four. I don't need you to tell me, "Hey, open a ticket and then give me logs.""
"Having a centralized place to manage the solution has been something that I have always wanted, and they are starting to understand that and bring things back together."
"One of our current issues is a publishing issue. If we whitelist Google Chrome, all the events of Google Chrome should be gone. It is not happening."
"The product could be easier to use. More work needs to be done on this aspect; it is not good enough yet. It also takes up a lot of server space. Sometimes we need to use up to seven servers."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"The user interface and workflow need improvement, and more connectors would help."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
"Technical support in Pakistan can be improved."
"If you use the appliance version then it won't handle a huge database volume."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
More RSA Identity Governance and Lifecycle Pricing and Cost Advice →
CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews while RSA Identity Governance and Lifecycle is ranked 22nd in Identity Management (IM) with 9 reviews. CyberArk Privileged Access Manager is rated 8.8, while RSA Identity Governance and Lifecycle is rated 6.8. The top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". On the other hand, the top reviewer of RSA Identity Governance and Lifecycle writes "Lacking customization, poor support, but useful auditing". CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard, whereas RSA Identity Governance and Lifecycle is most compared with SailPoint IdentityIQ, Saviynt, One Identity Manager and Cisco ISE (Identity Services Engine).
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.